{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:29:26Z","timestamp":1742941766504,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319172958"},{"type":"electronic","value":"9783319172965"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17296-5_12","type":"book-chapter","created":{"date-parts":[[2015,7,24]],"date-time":"2015-07-24T14:30:01Z","timestamp":1437748201000},"page":"125-131","source":"Crossref","is-referenced-by-count":2,"title":["Variations on Minimal Linear Codes"],"prefix":"10.1007","author":[{"given":"G\u00e9rard","family":"Cohen","sequence":"first","affiliation":[]},{"given":"Sihem","family":"Mesnager","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"12_CR1","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.1109\/18.705584","volume":"44","author":"A.E. Ashikhmin","year":"1998","unstructured":"Ashikhmin, A.E., Barg, A.: Minimal vectors in linear codes. IEEE Trans. Inf. Theory 44(5), 2010\u20132017 (1998)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"12_CR2","doi-asserted-by":"publisher","first-page":"1769","DOI":"10.1109\/18.556673","volume":"42","author":"G. Brassard","year":"1996","unstructured":"Brassard, G., Cr\u00e9peau, C., Santha, M.: Oblivious transfers and intersecting codes. IEEE Trans. Inf. Theory 42(6), 1769\u20131780 (1996)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"12_CR3","unstructured":"Chabanne, H., Cohen, G., Patey, A.: Towards secure two-party computation from the wire-tap channel (2013). arXiv:1306.6265"},{"issue":"1","key":"12_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/0012-365X(85)90190-6","volume":"56","author":"G.D. Cohen","year":"1985","unstructured":"Cohen, G.D., Lempel, A.: Linear intersecting codes. Discret. Math. 56(1), 35\u201343 (1985)","journal-title":"Discret. Math."},{"issue":"1","key":"12_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0166-218X(02)00437-7","volume":"128","author":"G.D. Cohen","year":"2003","unstructured":"Cohen, G.D., Encheva, S.B., Litsyn, S., Schaathun, H.G.: Intersecting codes and separating codes. Discret. Appl. Math. 128(1), 75\u201383 (2003)","journal-title":"Discret. Appl. Math."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Cohen, G., Mesnager, S., Patey, A.: On minimal and quasi-minimal linear codes. In: Proceedings of Fourteenth International Conference on Cryptography and Coding (IMACC 2013), Oxford. Lecture Notes in Computer Science, vol.\u00a08308, pp.\u00a085\u201398. Springer, Heidelberg (2013)","DOI":"10.1007\/978-3-642-45239-0_6"},{"key":"12_CR7","first-page":"11","volume-title":"Discrete Mathematics & Theoretical Computer Science, DMTCS Dijon 2003. Lecture Notes in Computer Science","author":"C. Ding","year":"2003","unstructured":"Ding, C., Yuan, J.: Covering and secret sharing with linear codes. In: Calude, C., Dinneen, M.J., Vajnovszki, V. (eds.) Discrete Mathematics & Theoretical Computer Science, DMTCS Dijon 2003. Lecture Notes in Computer Science, vol. 2731, pp. 11\u201325. Springer, Berlin (2003)"},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1002\/j.1538-7305.1952.tb01393.x","volume":"31","author":"E.N. Gilbert","year":"1952","unstructured":"Gilbert, E.N.: A comparison of signalling alphabets. Bell Syst. Tech. J. 31(3), 504\u2013522 (1952)","journal-title":"Bell Syst. Tech. J."},{"key":"12_CR9","volume-title":"The theory of error-correcting codes","author":"F.J. MacWilliams","year":"1977","unstructured":"MacWilliams, F.J., Sloane, N.J.: The theory of error-correcting codes. North Holland, Amsterdam (1977)"},{"key":"12_CR10","unstructured":"Massey, J.L.: Minimal codewords and secret sharing. In: Proceedings of 6th Joint Swedish-Russian International Workshop on Information Theory, Molle, pp.\u00a0276\u2013279 (1993)"},{"key":"12_CR11","unstructured":"Massey, J.L.: Some applications of coding theory in cryptography. In: Farrell, P.G. (ed.) Codes and Cyphers: Cryptography and Coding IV, pp.\u00a033\u201347. Formara Ltd, Southend-on-Sea (1995)"},{"issue":"2","key":"12_CR12","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TIFS.2006.873596","volume":"1","author":"H.G. Schaathun","year":"2006","unstructured":"Schaathun, H.G.: The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Trans. Inf. Forensics Secur. 1(2), 248\u2013255 (2006)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR13","unstructured":"Song, Y., Li, Z.: Secret sharing with a class of minimal linear codes (2012). arXiv:1202.4058"},{"key":"12_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-3810-9","volume-title":"Algebraic-Geometric Codes","author":"M.A. Tsfasman","year":"1991","unstructured":"Tsfasman, M.A., Vladut, S.G.: Algebraic-Geometric Codes. Kluwer, Dordrecht (1991)"}],"container-title":["CIM Series in Mathematical Sciences","Coding Theory and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17296-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T18:41:47Z","timestamp":1674240107000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17296-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319172958","9783319172965"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17296-5_12","relation":{},"ISSN":["2364-950X","2364-9518"],"issn-type":[{"type":"print","value":"2364-950X"},{"type":"electronic","value":"2364-9518"}],"subject":[],"published":{"date-parts":[[2015]]}}}